• Computer Security


    Hack Attacks
    Some of the latest ploys being used by hackers:

    Phishing: Official-looking e-mails and web sites try to dupe people into volunteering passwords and financial information.

    Pharming: Web addresses actually are hijacked. In other words, you type a legitimate address into your browser but get diverted to a hacker's site.

    Drive-by downloads: Malicious code is planted on a legitimate (or shady) web site. When you visit the site, this code can exploit weaknesses in your web browser to quietly infect your machine.

    Evil twin attacks: Hackers impersonate a Wi-Fi hot spot, jamming the legitimate signal with their own. You think you are logging onto a genuine service, but instead are linked to hackers who can snag personal data you transmit.

    Search engine poisoning: You do a search, say, for anti-spyware software. But hackers rig the search results to include an authentic-looking site that may infect your machine.

    Spyware: Confusing pop-up ads trick people into downloading software they don't want. Running in the background, these programs gum up computer performance, deliver more pop-ups, and may monitor your online travels.

    Keyloggers: Spyware that forwards your keystrokes to marketers or criminals so they know your passwords and web destinations.


    Staying Safe
    Some tips to secure your digital devices:


    • Windows users should install the latest Service Pack, and enable automatic security updates.
    • Avoid wireless (Wi-Fi) hotspots in busy places such as airports and hotels where many others could be connected.
    • Install Internet firewall software to block intruders.
    • Avoid using instant messaging via Wi-Fi networks.
    • Run anti-virus and anti-spyware software from trusted vendors, and keep these programs updated.
    • If your mobile phone has Bluetooth technology, de-activate it until you need it.
    • Set your e-mail program to automatically delete attachments containing "executable" (.exe) files.
    • Be wary of file-sharing programs; they can bundle lots of spyware.
    • Steer clear of questionable Web sites.
    • Consider switching to the Firefox browser or Apple computers; though not ironclad, they are targeted less often by virus writers than Microsoft applications.
    • Be wary of online offers for free games and toolbars.
    • Don't click any links in pop-up ads; close them by clicking the X icon in the title bar.
    • Activate security features of your home wireless network.
    • Ignore spam offers for anti-spy-ware tools; such offers may install spyware.
    • Turn off your laptop's wireless card until you need it.


    Did You Know?


    • One in 10 e-mails contains a virus, is spam or a phishing attempt.
    • Malicious code was found embedded in JPEG and BMP digital photo files.
    • You are most likely to get hacked on a Saturday; Tuesday is the lightest day for the bad stuff.
    • About 46 percent of phishing sites are hosted in the U.S. China is next at 28 percent, followed by Korea at 11 percent.

    • There were 1,017,208 known viruses in the first half of 2010, up 50 percent from the previous year.

    • Microsoft Windows users are still the number one target (99.4%) of all the new malware.

    THE STAR-LEDGER
    SOURCES: Richard Smith; Ben Edelman; F-Secure; Federal Trade Commission;
    IBM Global Business Security Index Report, The Anti-Phishing Working Group